IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security SolutionsWhite Papers (View All Report Types)
 
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Data Loss Prevention Insights from Security Executives
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines findings from a recent study on data loss prevention programs that interviewed 130 CISOs, VPs, directors, and managers.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Symantec Corporation

Solution Spotlight DLP PDF
sponsored by CDW Corporation
WHITE PAPER: This white paper explains the importance of monitoring your data, even when it's out of sight.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

CDW Corporation

Hotspot 2.0: Making Wi-Fi as Easy to Use and Secure as Cellular
sponsored by Ruckus Wireless
WHITE PAPER: Today's cellular networks are being overwhelmed with data traffic, much of it being generated by the rapid proliferation of smartphones. The latest projections are for the industry to ship over 800 million such devices in 2013.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Ruckus Wireless

How to survive security risks within a BYOD environment
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, but also on the technology that defends against those threats. So how do you do it? Consult the following white paper to find out now including the technology to consider and more.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dell, Inc. and Windows 8 Pro

Head First into the Sandbox
sponsored by Fortinet, Inc.
WHITE PAPER: Access this exclusive whitepaper now to learn about the evolution of sandboxing and explore some advanced evasion techniques.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Fortinet, Inc.

Security in the New Mobile Ecosystem – A Ponemon Institute Study
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.
Posted: 01 Oct 2014 | Published: 31 Aug 2014

Raytheon Trusted Computer Solutions

How to Woo Employees to Enterprise File Sync & Share: The Dropbox Breakup
sponsored by Code42
WHITE PAPER: Read this whitepaper to find out more about the dangers of personal cloud sharing and the benefits of enterprise-ready file sync and share.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Code42

Building an Intelligence-Driven Security Operations Center
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Learn why security organizations needs to shift resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach required to do so.
Posted: 22 Oct 2014 | Published: 17 Jun 2014

RSA, The Security Division of EMC

Get the Network Protection You Need with Next Generation Firewalls
sponsored by CDW Corporation
WHITE PAPER: In this white paper, discover what a next-generation firewall can do for your organization in terms of network security.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement